Key-Homomorphic Constrained Pseudorandom Functions

被引:0
|
作者
Banerjee, Abhishek [1 ]
Fuchsbauer, Georg [2 ]
Peikert, Chris [1 ]
Pietrzak, Krzysztof [2 ]
Stevens, Sophie [3 ]
机构
[1] Georgia Inst Technol, Coll Comp, Sch Comp Sci, Atlanta, GA 30332 USA
[2] IST Austria, Klosterneuburg, Austria
[3] Univ Bristol, Bristol, Avon, England
来源
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A pseudorandom function (PRF) is a keyed function F : K x X -> Y where, for a random key k is an element of K, the function F(k, .) is indistinguishable from a uniformly random function, given black-box access. A key-homomorphic PRF has the additional feature that for any keys k, k' and any input x, we have F(k + k', x) = F(k, x) circle plus F(k', x) for some group operations +, circle plus on K and Y, respectively. A constrained PRF for a family of sets S subset of P(X) has the property that, given any key k and set S is an element of S, one can efficiently compute a "constrained" key k(S) that enables evaluation of F(k, x) on all inputs x is an element of S, while the values F(k, x) for x is not an element of S remain pseudorandom even given k(S). In this paper we construct PRFs that are simultaneously constrained and key homomorphic, where the homomorphic property holds even for constrained keys. We first show that the multilinear map-based bit-fixing and circuit-constrained PRFs of Boneh and Waters (Asiacrypt 2013) can be modified to also be key-homomorphic. We then show that the LWE-based key-homomorphic PRFs of Banerjee and Peikert (Crypto 2014) are essentially already prefix-constrained PRFs, using a (non-obvious) definition of constrained keys and associated group operation. Moreover, the constrained keys themselves are pseudorandom, and the constraining and evaluation functions can all be computed in low depth. As an application of key-homomorphic constrained PRFs, we construct a proxy re-encryption scheme with fine-grained access control. This scheme allows storing encrypted data on an untrusted server, where each file can be encrypted relative to some attributes, so that only parties whose constrained keys match the attributes can decrypt. Moreover, the server can re-key (arbitrary subsets of) the ciphertexts without learning anything about the plaintexts, thus permitting efficient and fine-grained revocation.
引用
收藏
页码:31 / 60
页数:30
相关论文
共 50 条
  • [41] HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM PSEUDORANDOM FUNCTIONS
    LUBY, M
    RACKOFF, C
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 373 - 386
  • [42] TrustGWAS: A full-process workflow for encrypted GWAS using multi-key homomorphic encryption and pseudorandom number perturbation
    Yang, Meng
    Zhang, Chuwen
    Wang, Xiaoji
    Liu, Xingmin
    Li, Shisen
    Huang, Jianye
    Feng, Zhimin
    Sun, Xiaohui
    Chen, Fang
    Yang, Shuang
    Ni, Ming
    Li, Lin
    Cao, Yanan
    Mu, Feng
    CELL SYSTEMS, 2022, 13 (09) : 752 - +
  • [43] Key Homomorphic PRFs and Their Applications
    Boneh, Dan
    Lewi, Kevin
    Montgomery, Hart
    Raghunathan, Ananth
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 410 - 428
  • [44] HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM SINGLE PSEUDORANDOM FUNCTIONS
    PIEPRZYK, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 140 - 150
  • [45] Weak pseudorandom functions in Minicrypt
    Pietrzak, Krzysztof
    Sjoedin, Johan
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 423 - +
  • [46] Constraining Pseudorandom Functions Privately
    Boneh, Dan
    Lewi, Kevin
    Wu, David J.
    PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 494 - 524
  • [47] SoK: Oblivious Pseudorandom Functions
    Casacuberta, Silvia
    Hesse, Julia
    Lehmann, Anja
    2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 625 - 646
  • [48] On pseudorandom properties of multiplicative functions
    H. Daboussi
    A. Sárközy
    Acta Mathematica Hungarica, 2003, 98 : 273 - 300
  • [49] Functional Signatures and Pseudorandom Functions
    Boyle, Elette
    Goldwasser, Shafi
    Ivan, Ioana
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 501 - 519
  • [50] On pseudorandom properties of multiplicative functions
    Daboussi, H
    Sárközy, A
    ACTA MATHEMATICA HUNGARICA, 2003, 98 (04) : 273 - 300